Cartography

Latest version: v0.91.0

Safety actively analyzes 629855 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 24 of 27

0.10.0

- Added GSuite intel module.
- Fixed CRXcavator intel module to ingest all extension data.
- Fixed incorrect linking of AWS users to groups.
- Fixed incorrect 'lastupdated' field on AWS VPC peering relationships.

0.9.0

- Added new lines to end of test files for Drift Detection tests are no longer inconsistent
- Drift Detection: refactored reporting to use lists instead of dicts to maintain result order
- Move GCP unit tests to tests/unit/cartography/intel
- Add support for AWS EC2 key pairs
- Fixed issue 123 - logic bug in import crxcavator extensions
- Sorted collect values in boltstatementrecords to enforce consistency with each database pull

0.8.0

- Added pre-commit linting
- Drift detection: allow `add_shortcuts()` to have shortcuts as arguments
- Fixed 49 - Warn and return None when a NoSuchBucket error is caught from `get_bucket_acl()`
- Added CRXcavator intel module to ingest Chrome extension data
- Fixed 104 - Drift Detection CLI failed occasionally
- Fixed 99 - improved how AWS ELBs are determined to be internet exposed
- IAM: fixed UnboundLocalError and added support for AWS IAM Federated Principals
- Added Drift Detection feature to track graph changes over time

0.7.0

- GCP instances that are exposed to the internet via firewall rules are now marked with `exposed_internet: True`

0.6.0

- Add GCP firewalls, firewall allow and deny rules, network tags, connect firewall rules to IP ranges, GCP VPCs, subnets, network interfaces, NIC access configs
- Use partial_uri as unique identifier on GCP instances
- Add AWSPrincipal nodes to represent the root identity of each AWS account being synced
- Fix IAM statement parsing bug which would cause single-statement policies to crash sync
- Use policyuniverse to parse IAM statements and find role assumption permissions
- Ingest Global Secondary Indexes and more DynamoDB properties
- Change relationship between AWSPrincipal and AWSRole nodes to clarify the distinction between trust and permission relationships
- Add AWSPrincipal label to AWSRole nodes
- Integration tests are now configurable

0.5.0

- Ingest Google Cloud Platform organizations, projects, folders, and compute instance objects.

Page 24 of 27

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.